-
1
-
-
67651017750
-
-
Chinese source
-
2007.
-
(2007)
-
-
-
2
-
-
0022109771
-
Dynamic security assessment utilizing the transient energy function method
-
EL-KADY M A, TANG C K, CARVALHO V F, et al. Dynamic security assessment utilizing the transient energy function method[J]. IEEE Transactions on Power Systems, 1984, 1(3): 284-291.
-
(1984)
IEEE Transactions on Power Systems
, vol.1
, Issue.3
, pp. 284-291
-
-
El-Kady, M.A.1
Tang, C.K.2
Carvalho, V.F.3
-
3
-
-
0028426229
-
System vulnerability as a concept to assess power system dynamic security
-
FOUAD A A, ZHOU Qin, VITTTAL V. System vulnerability as a concept to assess power system dynamic security[J]. IEEE Transactions on Power Systems, 1994, 9(2): 1009-1015.
-
(1994)
IEEE Transactions on Power Systems
, vol.9
, Issue.2
, pp. 1009-1015
-
-
Fouad, A.A.1
Zhou, Q.2
Vitttal, V.3
-
4
-
-
33748885146
-
Vulnerability assessment and survey program-overview of assessment methodology
-
U. S. Department of Energy Office of Energy Assurance
-
U. S. Department of Energy Office of Energy Assurance. Vulnerability assessment and survey program-overview of assessment methodology[EB/OL]. (2001-09-28). http://www.Esisac.com/publicdocs/assessment_methods/ OEA_VA_Methodology.pdf.
-
(2001)
-
-
-
5
-
-
21244485295
-
Draft: Vulnerability assessment methodology-electric power infrastructure
-
U. S. Department of Energy Office of Energy Assurance
-
U. S. Department of Energy Office of Energy Assurance. Draft: vulnerability assessment methodology-electric power infrastructure[EB/OL]. (2002-09-30). http://www.Esisac.com/publicdocs/assessment_methods/ OEA_VA_Methodology.pdf.
-
(2002)
-
-
-
6
-
-
0028369620
-
Application of artificial neural networks in power system security and vulnerability assessment
-
ZHOU Qin, DAVIDSON J, FOUAD A A. Application of artificial neural networks in power system security and vulnerability assessment[J]. IEEE Transactions on Power Systems, 1994, 9(1): 525-532.
-
(1994)
IEEE Transactions on Power Systems
, vol.9
, Issue.1
, pp. 525-532
-
-
Zhou, Q.1
Davidson, J.2
Fouad, A.A.3
-
7
-
-
51349109075
-
Power system voltage stability and its present investigation (II)
-
SU Yongchun, CHENG Shijie, WEN Jingyu, et al. Power system voltage stability and its present investigation (II)[J]. Electric Power Automation Equipment, 2006, 26(7): 97-100.
-
(2006)
Electric Power Automation Equipment
, vol.26
, Issue.7
, pp. 97-100
-
-
Su, Y.1
Cheng, S.2
Wen, J.3
-
9
-
-
0025423396
-
An energy based security measure for assessing vulnerability to voltage collapse
-
DEMARCO C L, QVERBYE T J. An energy based security measure for assessing vulnerability to voltage collapse[J]. IEEE Transactions on Power Systems, 1990, 5(2): 419-427.
-
(1990)
IEEE Transactions on Power Systems
, vol.5
, Issue.2
, pp. 419-427
-
-
Demarco, C.L.1
Qverbye, T.J.2
-
10
-
-
50049104676
-
Quantification index of voltage stability based on energy information
-
LIU Qunying, LIU Junyong, LIU Qifang. Quantification index of voltage stability based on energy information[J]. Electric Power Automation Equipment, 2008, 28(8): 8-13.
-
(2008)
Electric Power Automation Equipment
, vol.28
, Issue.8
, pp. 8-13
-
-
Liu, Q.1
Liu, J.2
Liu, Q.3
-
11
-
-
0026203133
-
Voltage security enhancement using energy based sensitivities
-
OVERBYE T J, DEMARCO C L. Voltage security enhancement using energy based sensitivities[J]. IEEE Transactions on Power Systems, 1991, 6(3): 1196-1202.
-
(1991)
IEEE Transactions on Power Systems
, vol.6
, Issue.3
, pp. 1196-1202
-
-
Overbye, T.J.1
Demarco, C.L.2
-
12
-
-
0031678506
-
Worst-load-increase direction method for fast identification of voltage-weakness indicators
-
BORNPARD E, CARPANETO E, CHICCO G, et al. Worst-load-increase direction method for fast identification of voltage-weakness indicators[J]. IEEE Proceedings-Generation, Transmission and Distribution, 1998, 145(1): 27-32.
-
(1998)
IEEE Proceedings-Generation, Transmission and Distribution
, vol.145
, Issue.1
, pp. 27-32
-
-
Bornpard, E.1
Carpaneto, E.2
Chicco, G.3
-
13
-
-
0037672425
-
Improving voltage security assessment and ranking vulnerable buses with consideration of power system limits
-
AMJA N, ESMAILI M. Improving voltage security assessment and ranking vulnerable buses with consideration of power system limits[J]. Electrical Power and Energy Systems, 2003, 25(9): 705-715.
-
(2003)
Electrical Power and Energy Systems
, vol.25
, Issue.9
, pp. 705-715
-
-
Amja, N.1
Esmaili, M.2
-
14
-
-
0034428672
-
Risk based voltage security assessment
-
HUA Wan, MCCALLEY J D, VITTAL V. Risk based voltage security assessment[J]. IEEE Transactions on Power Systems, 2000, 15(4): 1247-1254.
-
(2000)
IEEE Transactions on Power Systems
, vol.15
, Issue.4
, pp. 1247-1254
-
-
Hua, W.1
Mccalley, J.D.2
Vittal, V.3
-
15
-
-
60949089689
-
Transient security risk assessment of power system based on risk theory and fuzzy reasoning
-
LIU Xindong, JIANG Quanyuan, CAO Yijia, et al. Transient security risk assessment of power system based on risk theory and fuzzy reasoning[J]. Electric Power Automation Equipment, 2009, 29(2): 15-20.
-
(2009)
Electric Power Automation Equipment
, vol.29
, Issue.2
, pp. 15-20
-
-
Liu, X.1
Jiang, Q.2
Cao, Y.3
-
16
-
-
33947683332
-
A new analysis method for early detection and prevention of cascading events
-
SONG Hongbiao, MLADEN K. A new analysis method for early detection and prevention of cascading events[J]. Electric Power Systems Research, 2006, 77(8): 1132-1142.
-
(2006)
Electric Power Systems Research
, vol.77
, Issue.8
, pp. 1132-1142
-
-
Song, H.1
Mladen, K.2
-
17
-
-
47949102947
-
Contingency assessment for voltage dip and short term voltage stability analysis
-
Charleston, USA
-
TIWARI A, AJJARAPU V. Contingency assessment for voltage dip and short term voltage stability analysis[C]//2007 IREP Symposium. Charleston, USA:[s.n.], 2007: 1-8.
-
(2007)
2007 IREP Symposium
, pp. 1-8
-
-
Tiwari, A.1
Ajjarapu, V.2
-
18
-
-
2942587343
-
Transition to chaos in complex dynamical networks
-
LI Xiang, CHEN Guanrong, KO Kingtim. Transition to chaos in complex dynamical networks[J]. Physica A, 2004, 338(3/4): 367-378.
-
(2004)
Physica A
, vol.338
, Issue.3-4
, pp. 367-378
-
-
Li, X.1
Chen, G.2
Ko, K.3
-
19
-
-
40249092935
-
Transition to chaos in small-world dynamical network
-
YUAN Wujie, LUO Xiaoshu, JIANG Pinqin, et al. Transition to chaos in small-world dynamical network[J]. Chaos, Solitons and Fractals, 2008, 37(3): 799-806.
-
(2008)
Chaos, Solitons and Fractals
, vol.37
, Issue.3
, pp. 799-806
-
-
Yuan, W.1
Luo, X.2
Jiang, P.3
-
20
-
-
0034721164
-
Error and attack tolerance of complex networks
-
ALBERT R, JEONG H, BARABASI A. Error and attack tolerance of complex networks[J]. Nature, 2000, 406(6794): 378-382.
-
(2000)
Nature
, vol.406
, Issue.6794
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabasi, A.3
-
21
-
-
6444241717
-
Tolerance of scale-free networks: From friendly to intentional attack strategies
-
GALLOS L K, ARGYRAKIS P, BUNDE A, et al. Tolerance of scale-free networks: from friendly to intentional attack strategies[J]. Physical A, 2004, 344(3/4): 504-509.
-
(2004)
Physical A
, vol.344
, Issue.3-4
, pp. 504-509
-
-
Gallos, L.K.1
Argyrakis, P.2
Bunde, A.3
-
22
-
-
42749103823
-
Structural vulnerability of North American Power Grid
-
ALBERT R, ALBERT I, NAKARADO G L. Structural vulnerability of North American Power Grid[J]. Physical Review E, 2004(69): 1-4.
-
(2004)
Physical Review E
, Issue.69
, pp. 1-4
-
-
Albert, R.1
Albert, I.2
Nakarado, G.L.3
-
23
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
WATTS D J, STROGATZ S H. Collective dynamics of 'small-world' networks[J]. Nature, 1998, 393(6684): 440-442.
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
24
-
-
0042855693
-
An experimental study of search in global social networks
-
DODDS P S, MUHAMAD R, WATTS D J. An experimental study of search in global social networks[J]. Science, 2003, 301(5634): 827-829.
-
(2003)
Science
, vol.301
, Issue.5634
, pp. 827-829
-
-
Dodds, P.S.1
Muhamad, R.2
Watts, D.J.3
-
25
-
-
22744442888
-
Small-worlds: The dynamics of between order and randomness
-
WATTS D J. Small-worlds: the dynamics of between order and randomness[J]. The American Mathematical Monthly, 2000, 107(7): 664-668.
-
(2000)
The American Mathematical Monthly
, vol.107
, Issue.7
, pp. 664-668
-
-
Watts, D.J.1
-
26
-
-
59949094203
-
Temporal and spatial evolvement model of power grid
-
CAO Yijia, WANG Guangzeng, BAO Zhejing, et al. Temporal and spatial evolvement model of power grid[J]. Electric Power Automation Equipment, 2009, 29(1): 1-5.
-
(2009)
Electric Power Automation Equipment
, vol.29
, Issue.1
, pp. 1-5
-
-
Cao, Y.1
Wang, G.2
Bao, Z.3
-
28
-
-
33745167290
-
Small-world topological model based vulnerability assessment algorithm for large-scale power grid
-
DING Ming, HAN Pingping. Small-world topological model based vulnerability assessment algorithm for large-scale power grid[J]. Automation of Electric Power Systems, 2006, 30(8): 7-11.
-
(2006)
Automation of Electric Power Systems
, vol.30
, Issue.8
, pp. 7-11
-
-
Ding, M.1
Han, P.2
-
30
-
-
9244246297
-
A practical approach for integrated power system vulnerability analysis with protection failures
-
YU Xingbin, SINGH Chanan. A practical approach for integrated power system vulnerability analysis with protection failures[J]. IEEE Transmissions on Power Systems, 2004, 19(4): 1811-1820.
-
(2004)
IEEE Transmissions on Power Systems
, vol.19
, Issue.4
, pp. 1811-1820
-
-
Yu, X.1
Singh, C.2
-
31
-
-
0030126334
-
Anatomy of power system blackouts: Preventive relays strategies
-
TAMRONGLAK S, HOROWITZ S H, PHADKE A G, et al. Anatomy of power system blackouts: preventive relays strategies[J]. IEEE Transactions on Power Systems, 1996, 11(2): 708-715.
-
(1996)
IEEE Transactions on Power Systems
, vol.11
, Issue.2
, pp. 708-715
-
-
Tamronglak, S.1
Horowitz, S.H.2
Phadke, A.G.3
-
32
-
-
0031612513
-
An importance sampling application; 179 bus WSCC system under voltage based hidden failures and relay misoperation
-
Hawaii, USA
-
BAE K, THORP J S. An importance sampling application; 179 bus WSCC system under voltage based hidden failures and relay misoperation[C]//The 31st International Conference on System Science. Hawaii, USA:[s.n.], 1998: 39-46.
-
(1998)
The 31st International Conference on System Science
, pp. 39-46
-
-
Bae, K.1
Thorp, J.S.2
-
33
-
-
35348812520
-
Electric power grid structural vulnerability assessment
-
Montreal, Canada
-
MAO Anjia, YU Jiaxi, GUO Zhizhong. Electric power grid structural vulnerability assessment[C]//Power Engineering Society General Meeting. Montreal, Canada:[s.n.], 2006: 1-6.
-
(2006)
Power Engineering Society General Meeting
, pp. 1-6
-
-
Mao, A.1
Yu, J.2
Guo, Z.3
-
34
-
-
33846079797
-
Identification of vulnerability lines in power grid based on complex network theory
-
CAO Yijia, CHEN Xiaogang, SUN Ke. Identification of vulnerability lines in power grid based on complex network theory[J]. Electric Power Automation Equipment, 2006, 26(12): 1-5.
-
(2006)
Electric Power Automation Equipment
, vol.26
, Issue.12
, pp. 1-5
-
-
Cao, Y.1
Chen, X.2
Sun, K.3
-
35
-
-
42549168426
-
Identification of vulnerable lines in power grid based on complex network theory
-
Florida, USA
-
CHEN Xiaogang, SUN Ke, CAO Yijia, et al. Identification of vulnerable lines in power grid based on complex network theory[C]//Power Engineering Society General Meeting. Florida, USA:[s.n.], 2007: 1-6.
-
(2007)
Power Engineering Society General Meeting
, pp. 1-6
-
-
Chen, X.1
Sun, K.2
Cao, Y.3
-
36
-
-
49649098759
-
Vulnerability assessment of bulk power grid based on complex network theory
-
Nanjing, China
-
ZHANG Guohua, WANG Ce, ZHANG Jianhua, et al. Vulnerability assessment of bulk power grid based on complex network theory[C]//The Third International Conference on Electric Utility Deregulation and Restructuring and Power Technologies. Nanjing, China:[s.n.], 2008: 1554-1558.
-
(2008)
The Third International Conference on Electric Utility Deregulation and Restructuring and Power Technologies
, pp. 1554-1558
-
-
Zhang, G.1
Wang, C.2
Zhang, J.3
-
37
-
-
22744442444
-
Review on models of cascading failure in complex power grid
-
SUN Ke, HAN Zhenxiang, CAO Yijia. Review on models of cascading failure in complex power grid[J]. Power System Technology, 2004, 29(13): 1-9.
-
(2004)
Power System Technology
, vol.29
, Issue.13
, pp. 1-9
-
-
Sun, K.1
Han, Z.2
Cao, Y.3
-
38
-
-
33846157709
-
Review of cascading failures in electric power network
-
ZHAN Yong, CHENG Haozhong, XIONG Hugang. Review of cascading failures in electric power network[J]. Electric Power Automation Equipment, 2005, 25(9): 93-98.
-
(2005)
Electric Power Automation Equipment
, vol.25
, Issue.9
, pp. 93-98
-
-
Zhan, Y.1
Cheng, H.2
Xiong, H.3
-
39
-
-
39749099884
-
Structural vulnerability analysis of large power grid based on complex network theory
-
CHEN Xiaogang, SUN Ke, CAO Yijia. Structural vulnerability analysis of large power grid based on complex network theory[J]. Transactions of China Electrotechnical Society, 2007, 22(10): 138-143.
-
(2007)
Transactions of China Electrotechnical Society
, vol.22
, Issue.10
, pp. 138-143
-
-
Chen, X.1
Sun, K.2
Cao, Y.3
-
40
-
-
54549125777
-
Power system intelligent dispatch
-
AI Lin, HUA Dong. Power system intelligent dispatch[J]. Electric Power Automation Equipment, 2008, 28(10): 83-87.
-
(2008)
Electric Power Automation Equipment
, vol.28
, Issue.10
, pp. 83-87
-
-
Ai, L.1
Hua, D.2
-
41
-
-
0035791838
-
Multi-agent technology for vulnerability assessment and control
-
Seattle, USA
-
JUNG Juhwan, LIU Chenching. Multi-agent technology for vulnerability assessment and control[C]//Power Engineering Society Summer Meeting. Seattle, USA:[s.n.], 2001: 1287-1292.
-
(2001)
Power Engineering Society Summer Meeting
, pp. 1287-1292
-
-
Jung, J.1
Liu, C.2
-
42
-
-
26244452473
-
Security and vulnerability in electric power systems
-
Missouri, USA
-
WATTS D. Security and vulnerability in electric power systems[C]//The 35th North American Power Symposium. Missouri, USA:[s.n.], 2003: 559-566.
-
(2003)
The 35th North American Power Symposium
, pp. 559-566
-
-
Watts, D.1
-
43
-
-
0037002089
-
Security challenges for the electricity infrastructure (supplement to computer magazine)
-
MASSOUD A. Security challenges for the electricity infrastructure (supplement to computer magazine)[J]. Electric Power Research Institute, 2002, 35(4): 8-10.
-
(2002)
Electric Power Research Institute
, vol.35
, Issue.4
, pp. 8-10
-
-
Massoud, A.1
-
44
-
-
67651064508
-
Vulnerability assessment of cyber security in power industry
-
Atlanta, USA
-
YU Jiaxi, MAO Anjia, GUO Zhizhong. Vulnerability assessment of cyber security in power industry[C]//Power Systems Conference and Exposition, 2006. Atlanta, USA:[s.n.], 2006: 2200-2205.
-
(2006)
Power Systems Conference and Exposition, 2006
, pp. 2200-2205
-
-
Yu, J.1
Mao, A.2
Guo, Z.3
-
45
-
-
49649113049
-
Preliminary research on vulnerability evaluation and safeguard of power system under external force harassment
-
WANG Peng, XU Dongjie, WANG Xuedong, et al. Preliminary research on vulnerability evaluation and safeguard of power system under external force harassment[J]. Journal of North China Electric Power University, 2005, 32(1): 14-18.
-
(2005)
Journal of North China Electric Power University
, vol.32
, Issue.1
, pp. 14-18
-
-
Wang, P.1
Xu, D.2
Wang, X.3
|